A blueprint for an Enterprise Information Security Assurance System. Acuity Risk Management LLP



Similar documents
A complete Information Risk Management solution for ISF Members using IRAM and STREAM

STREAM Cyber Security

Improving Residual Risk Management Through the Use of Security Metrics

Module 7 Study Guide

UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS ADMINISTRATION TOOLS NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

Adopting Agile Testing

3 keys to effective service availability management. Visibility. Proactivity. Collaboration.

Information Security: Business Assurance Guidelines

How to implement an ISO/IEC information security management system

IT Governance. What is it and how to audit it. 21 April 2009

RSA ARCHER OPERATIONAL RISK MANAGEMENT

LexisOne. LexisOne. Powered by Microsoft Dynamics AX EnterpriseSolutions

Business Continuity Management Systems. Protecting for tomorrow by building resilience today

Customer Needs Management and Oracle Product Lifecycle Analytics

Sage 300 Distribution

Functional and technical specifications. Background

Overview TECHIS Carry out security testing activities

How To Improve Your Business

ITIL Introduction and Overview & ITIL Process Map

Integrated Stress Testing

NHS ISLE OF WIGHT CLINICAL COMMISSIONING GROUP BUSINESS CONTINUITY POLICY

Procurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire. P3M3 Project Management Self-Assessment

P3M3 Portfolio Management Self-Assessment

IT Performance & Capacity Management

PROTEUS Enterprise - IT Governance, Risk and Compliance Management Solution

Risk Management Procedure

Centralized Secure Vault with Serena Dimensions CM

Monitoring Best Practices for

Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Industrial Cyber Security Risk

Sage ERP I White Paper. An ERP Guide to Driving Efficiency

ALM/Quality Center. Software

Convergence of Desktop Security and Management: System Center 2012 Endpoint Protection and System Center 2012 Configuration Manager

Now Leverage Big Data for Successful Customer Engagements

Business Process Management (BPM) Software

PREMIER SERVICES MAXIMIZE PERFORMANCE AND REDUCE RISK

Tracking Levels of Employee Understanding and Engagement During Change Ghassan Karian Karian and Box London, U.K.

Monitoring Best Practices for COMMERCE

EXPERT STRATEGIES FOR LOG COLLECTION, ROOT CAUSE ANALYSIS, AND COMPLIANCE

Agile Manufacturing for ALUMINIUM SMELTERS

Managing the Multi-Company Corporation

Ensuring security the last barrier to Cloud adoption

Sage 300 Finance. Sage 300 Finance. Industry Solution. Generic to all Industries and Organisations. Target. Business Processes. Business Challenges

WHITE PAPER OCTOBER Unified Monitoring. A Business Perspective

RSA ARCHER BUSINESS CONTINUITY MANAGEMENT AND OPERATIONS Solution Brief

Information Security Managing The Risk

SOLUTION WHITE PAPER. BMC Manages the Full Service Stack on Secure Multi-tenant Architecture

Paul Vlissidis Group Technical Director NCC Group plc

White Paper Achieving GLBA Compliance through Security Information Management. White Paper / GLBA

Sickness absence: This document could save you over 100,000

mysap ERP FINANCIALS SOLUTION OVERVIEW

ViewPoint. Building and leveraging Metrics Framework to drive Supply Chain Performance. Tejas Faldu, Srikanth Krishna. Abstract

Enterprise Security Tactical Plan

Creating a Business Intelligence Competency Center to Accelerate Healthcare Performance Improvement

Improving residual risk management through the use of security metrics

7 Directorate Performance Managers. 7 Performance Reporting and Data Quality Officer. 8 Responsible Officers

TEST MANAGEMENT SOLUTION Buyer s Guide WHITEPAPER. Real-Time Test Management

ipm it s project management Integrated. Intuitive. Intelligent IPM PROJECT MANAGEMENT STANDALONE

Cyber Security Evolved

A MATTER MANAGEMENT/e-BILLING BUYING GUIDE

Job Grade: Band 5. Job Reference Number:

The Power of Risk, Compliance & Security Management in SAP S/4HANA

<risk> Enterprise Risk Management

IBM Security QRadar Risk Manager

Achieve. Performance objectives

Microsoft IT Increases Security and Streamlines Antimalware Management by Using Microsoft Forefront Endpoint. Protection 2010.

ISO 31000: ISO/IEC & ISO Guide 73: New Standards for the Management of Risk

How to measure your business resiliency

Information Technology Governance. Steve Crutchley CEO - Consult2Comply

Fogbeam Vision Series - The Modern Intranet

Securing the Microsoft Cloud

White Paper: FSA Data Audit

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

Location of the job: CFO Revenue Assurance

HUMAN RESOURCES SOFTWARE FOR THE EVOLVING BUSINESS

Risk Management & Business Continuity Manual

Actuate for: Financial Management Reporting Applications

Workshop materials Completed templates and forms

DATA AUDIT: Scope and Content

Security Management. Security is taken for granted until something goes wrong.

1.1.1 Introduction to Cloud Computing

WHITEPAPER: Streamline Enterprise IT Management Network Map Automation. A Visual Path to Automated Network Documentation

The ITIL v.3. Foundation Examination

A strategic approach to fraud

Project Portfolio Management Information System

SCOTTISH CENSUS INDEPENDENT SECURITY REVIEW REPORT

Collaborative Project Management Made Simple

Risk & Assurance. Tailored to your needs. Internal audit solutions

CMDB and its Role in Transformation

MAGENTA KEYLINE IS A CUTTER GUIDE, DO NOT PRINT. PLEASE SET TRAPPING THROUGHOUT

Transcription:

A blueprint for an Enterprise Information Security Assurance System Acuity Risk Management LLP Introduction The value of information as a business asset continues to grow and with it the need for effective information security. A wide-range of security products are available, and used, but we still appear increasingly vulnerable to security failures, both within our organisations and through the supply / customer chain. Facing threats of regulatory censure, loss of customers or even prosecution if their information management falls below expected standards, Executives are increasingly looking for assurance that their information is being managed securely. The popular ISO 27000 series of international standards for Information Security Management Systems (ISMS) were designed to provide assurance to senior management and other stakeholders that information security policies, processes and practices are based on an understanding of the risks to the business and are effective and sufficient for the needs of the business. Certification programmes have been developed world-wide to provide independent assurance that these management systems are (and continue to be) effective. Although ISMS requirements and processes are relatively well-defined, the practical implementation of management systems, Enterprise-wide, is still in its infancy. This paper describes a blueprint for Enterprise Information Security Assurance Systems. Although this paper focuses on Enterprise Information Security Assurance Systems, the principles are applicable to any management system solution, including Quality Management Systems (ISO 9000 series), Environmental Management Systems (ISO 14000 series), Occupational Health & Safety Systems (ISO 18000 series) and Business Continuity Management Systems (BS 25999 series). Governance vs Assurance Before Executives can expect assurance, they need to set objectives, targets and strategy, i.e. they need to establish a system of governance against which assurance will be delivered. For information security, governance will involve: A c u i t y R i s k M a n a g e m e n t L L P, 2 0 1 0 P a g e 1

Setting information security strategy & direction Defining criteria by which information security risks will / will not be accepted Specifying performance indicators or targets, e.g. to keep risk within appetite, to maintain compliance levels above certain thresholds, to limit losses from incidents to a target level Defining requirements for assurance, e.g. the information security standards that the organisation will comply with, the types of risk that will be managed and whether there are variations in these requirements across the organisation. Assurance is concerned with enabling the system of governance, i.e. through: Scoping the information security standards and the way that they will be applied across the organisation to meet the governance requirements Designing, and operating the assurance processes Identifying, assessing and measuring applicable risks, controls and events (incidents and near-misses) Informing governance, through effective and meaningful reporting. The requirements for Information Security Assurance The key first steps in implementing an assurance system are to determine the information security compliance requirements (e.g. ISO 27001, ISF Standard of Good Practice etc.), the risk types and to define the scope. For an ISMS, the scope is likely to include: Information assets Teams Customers Platforms Networks Sites / buildings Business processes Third party organisations Business application systems Critical services Media Management will want various assurances in relation to the components within scope, referred to here under a broad definition as Assets. The most important assurances are as follows: Assurance that: all material Assets within scope have been identified all Controls that are applicable to Assets within scope have been identified and all Controls are operating effectively within tolerances set by management all Risks to Assets within scope have been identified and all Risks are contained within management s appetite for risk. A c u i t y R i s k M a n a g e m e n t L L P, 2 0 1 0 P a g e 2

Management will also want assurance that the management system reacts to change and is kept up to date. For example, if a new application system is brought within scope of an ISMS, management will want assurance that all risks relevant to that application have been identified, assessed and treated and continue to be managed within risk appetite. Management will also want assurance that all controls relevant to the application are operating effectively. Within large organisations, management will want assurance that the above requirements are being delivered consistently Enterprise wide. Challenges in delivering Information Security Assurance There are several information security assurance challenges that, in the past, have proved difficult to overcome. 1. Up to date assurance status. Organisational objectives and structures, their information handling requirements, threats and control performance change regularly and Executives can only receive assurance if the relevant information is accurate and current. 2. Structure around business assets. Risks and controls apply to business assets (information, applications, teams etc.) some of which are local, but others (such as corporate networks and enterprise applications) which may be shared. Risk and control compliance assessments are likely to vary between different assets and these variations must be visible to Executives seeking assurance. 3. Granularity of analysis and reporting. Management may want assurance in relation to assets, groups of assets, business units, business processes, regional views, Enterprise-wide views etc. It should be possible to report assurance status to Executives depending on their specific responsibilities and areas of interest. 4. Assessment versus Measurement of control effectiveness. The effectiveness of controls is a critical measurement for information security assurance. Without this, it is impossible to have confidence that controls are mitigating risk as anticipated. Simply confirming the existence of a control is not enough, nor is subjective assessment of performance. It is important to look for quantifiable performance indicators or metrics against which targets can be set and measured. 5. Action tracking. Actions which are identified to improve control effectiveness, address vulnerabilities, implement new controls, transfer risk etc. must be tracked through to completion. As actions are completed they will affect the current assurance status (in a positive way) and this should be visible to management (as per item 1). A c u i t y R i s k M a n a g e m e n t L L P, 2 0 1 0 P a g e 3

6. Integration with other systems. Various other systems may provide data for the information security assurance system, e.g. metrics on the performance of certain controls, assets registers, document management systems / Intranet. Integration with these systems will usually be beneficial for more efficient assurance systems. 7. Extension of assurance to third parties. Most organisations are dependent on (or part of) a supply / customer chain with which they share information. Relationships with third parties, and respective information security obligations, may be governed by contracts or other agreements as defined by the system of governance. Executives will want assurance that their information is being managed securely by third parties. 8. Setting and using risk thresholds and appetite. In order to have assurance that information is being managed with an acceptable level of security, management needs to define thresholds for deciding which risks are acceptable / unacceptable and their appetite for information security risk, which may vary across the organisation. It must be possible to measure current risk status and compare with risk thresholds and appetite. These challenges are all addressed in the blueprint described below. Blueprint for an Enterprise Information Security Assurance system The following blueprint is drawn from Acuity s experience in implementing information security assurance systems for major organisations across virtually every business sector. The blueprint is provided as a table with each row describing four factors: a requirement, features to deliver the requirement, benefits of the features and the impact if the features are missing. Requirements are grouped into the following sections: 1. Scope and asset management 2. Measurement of control effectiveness 3. Measurement of risk 4. Integration and change management 5. Aggregation, grouping and reporting 6. Ease of deployment and use 7. Performance, scalability and security A c u i t y R i s k M a n a g e m e n t L L P, 2 0 1 0 P a g e 4

1. Scope and asset management 1 Scope and asset management 1a. Assurance that Specification of Asset Classes all assets within covering all categories of asset scope will be within scope. identified Checks that all assets from each Asset Class have been included in 1b. Assurance that all control requirements will be identified 1c. Assurance that all risks will be identified 1d. Assurance that key risk mitigating controls will be identified scope. Link control standards to Asset Classes so that, when an asset is brought into scope, the list of relevant controls applicable to that asset is created automatically Link threat lists to Asset Classes so that, when an asset is brought into scope, the list of relevant risks is created automatically Link key risk-mitigating controls to threats so that, when an asset is brought into scope, the list of key mitigating controls for each risk is created automatically Management assurance that: o all assets have been identified o a consistent approach is being taken across the Enterprise Management assurance that: o all relevant controls have been identified o a consistent approach is being taken across the Enterprise Management assurance that: o all relevant risks have been identified o a consistent approach is being taken across the Enterprise Management assurance that: o key risk mitigating controls have been identified o a consistent approach is being taken across the Enterprise The absence of an asset-based approach will lead to an oversimplified system which cannot provide any meaningful assurance. Inconsistent approach across different assets and weak assurance. 1e. Handling of Allow assets to be either local to Avoids duplication of effort. Less accurate and inefficient A c u i t y R i s k M a n a g e m e n t L L P, 2 0 1 0 P a g e 5

1 Scope and asset management shared assets management systems or shared between management systems. This allows risks to be assessed in relation to individual or groups of management systems and means that controls to shared assets only need to be assessed once. 1f. Handling of Allow controls to be made dependencies dependent on multiple other between controls controls so that a control (such as a business continuity plan) can only be considered effective if the controls on which it depends (such as data back-up, testing, maintenance etc.) are also effective. Accurate modelling of the real world situation where the business can be highly dependent on critical shared assets. Accurate modelling of the real world situation where controls rarely act in isolation to each other. assurance processes prone to error through the need reenter the same data multiple times. Less accurate assurance reporting through inability to model the real world. 2. Measurement of control effectiveness 2. Measurement of control effectiveness 2a. Assurance that Assess the implementation of controls are controls by taking into account a effective in variety of factors which are Management assurance that implemented controls are effective and mitigating risk as anticipated. Most compliance products concentrate on assessing whether or not A c u i t y R i s k M a n a g e m e n t L L P, 2 0 1 0 P a g e 6

2. Measurement of control effectiveness operation important for a mature and stable control, e.g. clear ownership, adequate documentation and evidence and fitness for purpose. Measure KPIs for controls to determine whether they are effective in operation and within tolerable thresholds. controls/processes are in place, and ignore whether or not they are effective in operation. The existence of controls doesn t provide any assurance to management, it is their effectiveness at mitigating specific risks which is important. 3. Measurement of risk 3 Measurement of risk 3a. Automatic In most risk management tools, calculation and residual risk is estimated by the recalculation of user. This is highly subjective and residual risk gets out of date quickly as threats change or as the performance of key risk mitigating controls changes. Residual risk should be calculated automatically and recalculated every time a component of risk changes More accurate risk assessments. Residual risk status always up to date with latest risk information. Easy to understand and use. Laborious and inaccurate estimates of residual risk, leading to weak assurance. A c u i t y R i s k M a n a g e m e n t L L P, 2 0 1 0 P a g e 7

3 Measurement of risk 3b. Measurement of Set risk appetite in multiple ways to risk in relation match business understanding and to risk appetite requirements. Calculate and report residual risk in relation to risk appetite. Demonstrated compliance with best practice risk management. Management visibility of risk status and whether or not action is required. No criteria against which to decide whether or not risks can be accepted leading to weak assurance. 4. Integration and change management 4. Integration and change management 4a. Multiple Manage multiple, related control management standards and risk types within a systems in a single assurance framework. Create single assurance an Integrated Management System framework for, say, ISO 27001, ISO 9001, ISO 14001, and ISO 18001 with each control standard and set of risks assessed using a suitable set of 4b. Integration of key management system criteria. Integration of risk, compliance, metrics and incident management based around common asset models and linked control standards. Improved efficiency and effectiveness from avoiding silos and taking a consistent approach across all management systems. Management visibility of true compliance and risk status taking account of performance metrics for key controls and incident history. Less efficient management systems, prone to inconsistency and error. Inability to understand true compliance and risk status leading to very weak assurance. A c u i t y R i s k M a n a g e m e n t L L P, 2 0 1 0 P a g e 8

4. Integration and change management components 4c. Adaptability to Automatic update of the risk and change compliance framework whenever the management system scope changes (e.g. new functions, merged departments, new business applications, third parties etc.) Accurate risk and compliance modelling of the Enterprise as it changes. Inefficient assurance processes, risk of inaccurate assurance reporting. 5. Aggregation, grouping and reporting 5 Aggregation, grouping and reporting 5a. Aggregation and Aggregation of views from local grouping management systems to groups of management systems and Enterprise-wide. Provide multiple assurance views for risk and compliance monitoring purposes, e.g. customer views, process views, organisation views, services provided. 5b. Reporting Real-time, on-demand graphical reporting via dashboards and on- Multiple management views for different layers of management and stakeholders, allowing earlier action to be taken to deal with unacceptable risks or major non-compliances. Highly visual easy to understand, at a glance reporting for senior Less efficient reporting on assurance. Less effective communication of assurance status to A c u i t y R i s k M a n a g e m e n t L L P, 2 0 1 0 P a g e 9

5 Aggregation, grouping and reporting screen reports. Export of data from to MS Excel workbooks for additional reporting and distribution. 5c. History Historical reports on risk, compliance and incident status. management with detailed back-up reports for further analysis. Visibility of progress being made in lowering risk levels, improving compliance and reducing numbers and costs of incidents. Also, demonstrating the overall value of an ISMS Executives. Inability to determine whether actions and associated expenditure are having the expected effect. 6. Ease of deployment and use 6 Ease of deployment and use 6a. Assistance with complex and time consuming tasks approval by management. Business impact and threat likelihood assistants to create rapid risk assessments for review and 6b. Configurability Options to configure schemes for risk assessment, control assessment, metrics and event management. Very quick and easy to use risk assessments which still produce rigorous risk data. Ability to support users preferred risk and compliance processes rather than users having to adapt their methodology to accommodate a software solution. Less efficient assurance processes. Possible user-resistance to the assurance system A c u i t y R i s k M a n a g e m e n t L L P, 2 0 1 0 P a g e 10

6 Ease of deployment and use 6c. Importing from Importation of any data held in spreadsheets spreadsheets including clients own control standards, asset registers, previous compliance assessments or 6d. Extended control assessment risk assessments. Import of control assessment questionnaires and automatic collection of data from scanning and logging systems. Quick and easy to automate existing processes and to backload historical data. Efficiency improvements and maximising the return from existing processes and systems. Less efficient assurance processes. Less efficient assurance processes. 7. Performance, scalability and security 7 Performance, scalability and security 7a. Performance Scalable and high-performance and scalability system with ability to add management systems, risk registers, assets, threats, controls and incidents 7b. User management and security without degradation of performance Users are given read-only or readwrite access to only those dashboards, screens and reports that they have been authorised to access. Fast, responsive user experience with risk and compliance status automatically calculated and reported in real-time. Management confidence that sensitive information is only accessible to authorised users. Possible user rejection of the assurance system. No future proofing. User rejection if an information security assurance system can t provide adequate security. A c u i t y R i s k M a n a g e m e n t L L P, 2 0 1 0 P a g e 11

Summary Executives will increasingly demand assurance that information is being managed securely (both internally and throughout the supply / customer chain) in accordance with their defined system of governance. Sophisticated software solutions are available today that can deliver the blueprint outlined in this paper and provide substantial efficiency and effectiveness benefits. Most importantly, management and stakeholders can gain assurance that information security is being managed and maintained in accordance with their wishes. Further information For further information, please contact Simon Marvell or Richard Mayall. Simon Marvell is a Partner and Managing Director of Acuity Risk Management LLP. He has over 25 years experience implementing risk management processes and solutions across almost every business sector. Prior to founding Acuity, Simon was a founding Partner and Managing Director of Insight Consulting, a UK based professional services firm which he sold to Siemens plc in 2004. simon.marvell@acuityrm.com Richard Mayall is a Partner and Director of Technology & Applications at Acuity Risk Management LLP. He has over 25 years experience in information security management systems and assurance and is a visiting lecturer on these subjects at University of London, Royal Holloway College. Prior to founding Acuity, Richard led the information security consultancy practice at Insight Consulting. richard.mayall@acuityrm.com Acuity Risk Management LLP Liberty House 222 Regent Street London W1B 5TR +44 (0) 20 7297 2086 www.acuityrm.com A c u i t y R i s k M a n a g e m e n t L L P, 2 0 1 0 P a g e 12